Static task
static1
Behavioral task
behavioral1
Sample
f788d706f123e509edde4409141636508c934f6a9ee42fe4811ee0de4c759127.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f788d706f123e509edde4409141636508c934f6a9ee42fe4811ee0de4c759127.exe
Resource
win10v2004-20221111-en
General
-
Target
f788d706f123e509edde4409141636508c934f6a9ee42fe4811ee0de4c759127
-
Size
388KB
-
MD5
0799de8d4008cf3de3ae77911fb32590
-
SHA1
c85780cd2cd8cf655d17821deaa657e24c7d4740
-
SHA256
f788d706f123e509edde4409141636508c934f6a9ee42fe4811ee0de4c759127
-
SHA512
89b8940cdbada469c8170e1f9a8fccb7e597a4f8c1ec0ff10fdcdfcc87f6b9a17cfb45e5cd33fdd57cb70bff3645d05dfc29ea5eba621090e049e707ff6ca09a
-
SSDEEP
6144:85esu4bXl5jN8aY3cep3qXngzgoibSx+PgsUV59B2BZS6eTSaK/rU:8hu4bHjBo6Xng0o5+05Sc1KA
Malware Config
Signatures
Files
-
f788d706f123e509edde4409141636508c934f6a9ee42fe4811ee0de4c759127.exe windows x86
10a11ec24ff8e6e26505989be3708ce7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ReportEventW
LookupSecurityDescriptorPartsW
RegOpenKeyExA
CryptDestroyHash
CryptSetHashParam
CreateServiceW
RegSetKeySecurity
RegCreateKeyExW
InitiateSystemShutdownA
RegDeleteKeyA
CryptEnumProvidersW
RegReplaceKeyW
LookupPrivilegeValueA
DuplicateTokenEx
StartServiceW
LookupPrivilegeDisplayNameW
CryptSignHashW
RegConnectRegistryA
RegQueryValueW
CryptEnumProviderTypesW
RegQueryInfoKeyA
comctl32
ImageList_DrawIndirect
CreateMappedBitmap
ImageList_LoadImageW
DrawInsert
ImageList_BeginDrag
ImageList_LoadImage
InitCommonControlsEx
ImageList_ReplaceIcon
GetEffectiveClientRect
ImageList_Duplicate
ImageList_DragShowNolock
DrawStatusTextA
CreateToolbar
ImageList_AddIcon
ImageList_Remove
ImageList_AddMasked
ImageList_SetFilter
ImageList_GetIconSize
ImageList_DragEnter
CreateStatusWindowW
CreateStatusWindow
CreateToolbarEx
ImageList_Copy
ImageList_Add
ImageList_EndDrag
kernel32
HeapFree
EnterCriticalSection
TlsFree
MultiByteToWideChar
SetConsoleCtrlHandler
SetHandleCount
GetUserDefaultLCID
CompareStringW
GetAtomNameA
CloseHandle
FindNextChangeNotification
TlsAlloc
GetFileSize
WritePrivateProfileStringW
LeaveCriticalSection
WideCharToMultiByte
GetSystemTime
ExitProcess
GetTempFileNameA
GetSystemTimeAsFileTime
GetConsoleCP
FindAtomW
GetConsoleScreenBufferInfo
GetThreadTimes
GetProcAddress
GetLastError
GetModuleHandleA
GetStringTypeA
OpenWaitableTimerW
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetTimeFormatW
IsValidCodePage
HeapSize
GetPrivateProfileIntW
GetOEMCP
GetLocaleInfoW
Sleep
FreeEnvironmentStringsW
GetConsoleMode
FreeLibrary
FreeEnvironmentStringsA
SetEnvironmentVariableA
GetDriveTypeW
GetModuleHandleW
HeapReAlloc
GetDateFormatA
RtlMoveMemory
OpenProcess
GetStringTypeW
GetThreadSelectorEntry
WriteFile
GetACP
CreateNamedPipeW
GetSystemDirectoryW
GetThreadLocale
EnumSystemCodePagesW
GetStdHandle
GetThreadContext
IsDebuggerPresent
GetCurrentProcess
GetCurrentThread
OpenMutexW
TransactNamedPipe
FindResourceExW
VirtualFree
InterlockedExchange
LockFile
GlobalFindAtomA
SetConsoleCursorPosition
GetFileType
lstrcpynW
GetWindowsDirectoryA
FileTimeToLocalFileTime
DeleteCriticalSection
OpenMutexA
CreateDirectoryA
GetPrivateProfileSectionNamesA
ConnectNamedPipe
TerminateProcess
LCMapStringW
GlobalFlags
TlsSetValue
GetSystemDirectoryA
CreateEventA
GetTimeZoneInformation
GetLocalTime
GetProcAddress
RtlUnwind
GetComputerNameA
HeapAlloc
SetConsoleTitleA
SetStdHandle
ReadFile
HeapDestroy
VirtualQuery
WaitForMultipleObjects
SetThreadContext
LocalShrink
SetThreadLocale
EnumSystemLocalesA
EnumTimeFormatsA
CreateWaitableTimerW
VirtualAlloc
FreeLibraryAndExitThread
LocalHandle
LoadLibraryA
GetTimeFormatA
WriteConsoleW
WriteConsoleOutputW
GetEnvironmentStrings
GetLongPathNameW
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
WriteConsoleA
GetTickCount
TlsGetValue
FlushFileBuffers
GetModuleFileNameA
SetFileAttributesW
CompareStringA
GetCPInfo
GetEnvironmentStringsW
LCMapStringA
UnhandledExceptionFilter
QueryPerformanceCounter
CreateMutexA
CreateFileA
GetConsoleOutputCP
GetCurrentProcessId
GetStartupInfoA
CreatePipe
ReleaseSemaphore
RemoveDirectoryA
DeleteFiber
IsValidLocale
InterlockedIncrement
GetLocaleInfoA
HeapCreate
EnumSystemCodePagesA
SetLastError
user32
FillRect
GetOpenClipboardWindow
OemToCharA
GetClassNameW
MsgWaitForMultipleObjects
MessageBoxIndirectW
SetCursorPos
wsprintfA
GetWindowLongA
UnhookWinEvent
GetWindowModuleFileNameW
SetMenuDefaultItem
RemovePropA
CharLowerBuffA
GetClassInfoExW
LoadImageA
EnumClipboardFormats
WaitMessage
SetWindowsHookW
LoadCursorW
LookupIconIdFromDirectoryEx
DefFrameProcW
LoadAcceleratorsA
IsCharAlphaNumericA
SetProcessDefaultLayout
GetWindowInfo
EqualRect
DefMDIChildProcW
EnumDisplayDevicesW
InflateRect
GetDlgCtrlID
SendMessageTimeoutW
CharPrevW
SetMessageQueue
GetMenu
GetWindowPlacement
GetActiveWindow
GetClassLongA
LoadKeyboardLayoutA
SetClassLongA
SetMenuInfo
PeekMessageA
InvalidateRgn
InsertMenuW
InvertRect
BroadcastSystemMessageW
ScrollWindowEx
LoadStringA
AnyPopup
LoadStringW
CharLowerA
CharUpperA
EnumWindowStationsA
DlgDirSelectExW
MessageBoxW
RegisterClassExA
GetGuiResources
SetClipboardData
EnumDesktopsA
BlockInput
DefFrameProcA
ToAscii
ClientToScreen
SetPropA
GetSysColorBrush
PaintDesktop
CallMsgFilterW
RegisterClassA
EnumPropsExA
RegisterHotKey
ReleaseDC
DdeImpersonateClient
SetWindowPos
GetProcessDefaultLayout
LoadBitmapW
SetDlgItemInt
HideCaret
SetWindowRgn
SystemParametersInfoA
ModifyMenuA
EnumPropsW
SetScrollPos
ArrangeIconicWindows
CharToOemBuffA
DlgDirSelectComboBoxExW
IsCharLowerW
VkKeyScanExW
DrawCaption
SendIMEMessageExA
DdePostAdvise
GetUserObjectInformationA
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ